Hi, Jeff,

> 2019/12/19 午後1:06、Jeffrey Haas <jh...@pfrc.org>のメール:
> 
> Carlos,
> 
> On Thu, Dec 19, 2019 at 03:22:28AM +0000, Carlos Pignataro (cpignata) wrote:
>>> 2019/12/18 午後4:41、Jeffrey Haas <jh...@pfrc.org>のメール:
>>> But given that point, what precisely is the objection to the inner IP header
>>> of the BFD for vxlan having a TTL of 1?
>> 
>> The intent would be to protect of potential attacks beyond the encapsulating 
>> endpoint (i.e., packet coming into the VTEP vs. sourced, off-link spoofing).
> 
> I'm sorry if I'm seeing oblivious, but I'm missing something.
> 

No need to be sorry — useful dialogue! Thank you!

> The encapsulated packet's outer IP header, if single hop, could certainly
> benefit from GTSM procedures.
> 
> But once you're more than one hop away, and you're vulnerable to general
> attacks against packet insertion that the base vxlan PDUs have, how exactly
> does setting the TTL one way or the other provide protection?

Think of the VXLAN tunnel as a sigle-hop link. Yes, midpoint/in-transit packet 
insertion is an attack vector not covered by GTSM-ing the inner IP. However, 
traffic from outside the VXLAN (i.e., from outside the infrastructure) routed 
into the tunnel could not have a 255 TTL/HL.

> 
>>> I think this is partially a matter of attack spaces varying depending on
>>> whether we're targeting the management VNI vs. a tenant.  In the case of the
>>> management VNI, we (should) have very strong control over what BFD traffic
>>> is getting encapsulated.  
>>> 
>>> However, for tenant VNI mode, is the argument that depending on what the
>>> other vxlan PDU parameters look like, tenant sourced BFD PDUs may be
>>> indistinguishable from ones sourced by the management infrastructure?  And
>>> if so, how would GTSM help us here?
>> 
>> Tenant sourced BFD PDUs would not use host loopback dest addresses. Scanning 
>> through S6 of draft-ietf-bfd-vxlan-09, "MAY support the use of the 
>> Management VNI”.
>> 
>> And if there are already protections for not over-forwarding the BFD pak, 
>> the flip-question is “what does TTL = 1 bug you?”
>> 
>> My assumption was that if the base BFD specs say “GSTM is useful”, why not 
>> here?
> 
> Personally, I'm mostly ambivalent if it helps.  
> 

I am also not fixated in any solution. 

However, I am not ambivalent about comments being simply ignored. I would like 
the Editors and pen-holders of this document to actually respond to comments.

I am not looking for a specific answer, but I am looking for a thoughtful, 
deliberate, explicit, and intentional decision, shared on the list. That’s the 
role of Editors.

For example, see comment #2 in this note from June 2019 
https://mailarchive.ietf.org/arch/msg/rtg-bfd/BL9Ob66Yxie4wX13yZJELbYPLJs 

That comment, as well as others on that same note, were not ever responded to 
or acknowledged.

I reminded the editor that some comments were not being answered to: 
https://mailarchive.ietf.org/arch/msg/rtg-bfd/uzAtld-P7qB3B5z3NViFx83oaGA

Still, that thread did not even attempt to answer my question #2.

> If my observation above above about insertion attacks is valid, then using
> GTSM for the inner IP packet isn't helpful for protecting against what GTSM
> is intended for.  This leave us with roughly two modes:

Yes, it is valid, but it is not the only attack vector.

> 
> - With GTSM, enforce the usual related BFD procedure.  If packets aren't
>  "caught" by BFD, they have the potential to bounce around until they
>  expire.  Either way, BFD should go Down and the max damage is a number of
>  BFD packets eventually settling back to the 1/sec timer.
> - Without GTSM, exactly the same, just with less distance.
> 
> So, presuming my observation is valid:
> It doesn't help.
> It doesn't hurt (much).
> If we want to require it, go for it.
> 

I have the same question as before though.

To me the real vector of questions is: If the base GTSM spec requires it, why 
is that requirement relaxed? Where is it explained in the document?

> But it doesn't help your security story at all and using it perhaps confuses
> people about it actually helping.  So, don't insist on it for security
> reasons.

I would say “don’t insist on it for every possible security reason”. The fact 
that there are some cases not covered does not imply that there are none.



> 
> -- Jeff

Reply via email to